Sciweavers

8772 search results - page 1674 / 1755
» Business Services Networks
Sort
View
CSMR
2004
IEEE
14 years 2 months ago
Tool Support for Traceable Product Evolution
In software product families, the full benefit of reuse can only be achieved if traceability of requirements to architecture, components and further down to source code is support...
Patricia Lago, Eila Niemelä, Hans van Vliet
CCS
2006
ACM
14 years 2 months ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...
EEE
2004
IEEE
14 years 2 months ago
A Methodology to Find Web Site Keywords
For many companies and/or institutions it is no longer sufficient to have a web site and high quality products or services. What in many cases makes the difference between success...
Juan D. Velásquez, Richard Weber, Hiroshi Y...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
14 years 2 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
DAWAK
2006
Springer
14 years 2 months ago
Providing Persistence for Sensor Data Streams by Remote WAL
Rapidly changing environments such as robots, sensor networks, or medical services are emerging. To deal with them, DBMS should persist sensor data streams instantaneously. To achi...
Hideyuki Kawashima, Michita Imai, Yuichiro Anzai
« Prev « First page 1674 / 1755 Last » Next »